CHECK POINT

Encryption for Disk and Media

Check Point provide a centrally managed solution to enforce encryption across mobile and removable storage media.

Check Point Full Disk Encryption

Companies must secure data on their laptops as part of a comprehensive security policy. Without securing data, valuable datacan be lost or stolen from laptops which may result in legal and financial repercussions. The Check Point Full Disk Encryption Software Blade provides transparent security for all information on all endpoint hard drives, including user data, operating system files, temporary and deleted files. For maximum data protection multi-factor pre-boot authentication ensures user identity before the operating systems loads.

Check Point Endpoint Full Disk Encryption prevents unauthorised users from accessing data on encrypted devices by password protecting the entire hard drive prior to booting the operating system. Even after the system is booted and the user is accessing the operating system, the encryption/decryption driver runs in the background, automatically encrypting data as it is stored on the disk. Setup, deployment and management of encryption can be done via Check Point’s Central Management Console.

End User Transparency: User continues to use OS and access files while the Full Disk Encryption works in the background

Software Blade runs in the background: No user-sensed effect on the encrypted device’s performance.

Fast and Simple Deployment: Fast and simple deployment, including track record of 50,000 seats deployed in one month.

Set Encryption from Centralised Security Management

The centralised endpoint security manager allows administrators to set and enforce encryption policy for removable media and devices using algorithms such as AES 256-bit, for maximum data protection. Unique to Check Point, users can securely access encrypted media from unmanaged computers, with no client installation.

Removable Media Enforcement

Removable media enforcement maximises data security by placing a unique digital signature on each encrypted device, informing the user of any unauthorized changes made to stored information. Should any changes be detected, the device will need to be re-authorised before it can be used in the protected environment again.

Engage and Educate Users with Integrated Check Point UserCheck

Use Check Point UserCheck™ to actively engage and educate users as they access portable media to identify potential policy incidents as they occur and remediate them immediately.

Device Access Settings

The device access settings control access to removable media, devices and ports. Devices can be defined at a granular level by type, brand, size or ID, for maximum data protection. Access to endpoint ports such as USB, FireWire, Bluetooth, WiFi, printer, etc., can be centrally managed.

Granular Control of Data

Use Check Point UserCheck™ to actively engage and educate users as they access portable media to identify potential policy incidents as they occur and remediate them immediately.

Logging and Alerts

Administrators can store device activity and file movement logs to a central database, enabling centralized auditing and reporting for easy compliance. Email alerts can be configured to notify administrators about specific events.

Integrated into Check Point Software Blade Architecture

The Media Encryption Software Blade is integrated into the Software Blade Architecture. Endpoint Security Software Blades from Check Point bring unprecedented flexibility, control and efficiency to the management and deployment of endpoint security.Choose from six Software Blades to deploy only the protection you need, with the freedom to increase security at any time from a single central management console.

Endpoint Policy Management

The Check Point Endpoint Policy Management Software Blade simplifies endpoint security management by unifying all endpoint security capabilities for PC & Mac in a single console. Monitor, manage, educate and enforce policy, from an at-a-glance dashboard down to user and machine details, all with a few clicks.

Latest News

About Us

Sécurité provides specialised information security solutions that protect the digital assets of many of the world’s most security conscious organisations. We focus on helping enterprises to detect, defend and defeat security threats of all types.